Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-39413

Publication date:
30/04/2025
Missing Authorization vulnerability in David Gwyer Simple Sitemap – Create a Responsive HTML Sitemap.This issue affects Simple Sitemap – Create a Responsive HTML Sitemap: from n/a through 3.5.14.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-2156

Publication date:
30/04/2025
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2025

CVE-2025-30392

Publication date:
30/04/2025
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-30391

Publication date:
30/04/2025
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-30390

Publication date:
30/04/2025
Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-30389

Publication date:
30/04/2025
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-24091

Publication date:
30/04/2025
An app could impersonate system notifications. Sensitive notifications now require restricted entitlements. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.3. An app may be able to cause a denial-of-service.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-21416

Publication date:
30/04/2025
Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-3859

Publication date:
30/04/2025
Websites directing users to long URLs that caused eliding to occur in the location view could leverage the truncating behavior to potentially trick users into thinking they were on a different webpage This vulnerability affects Focus
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2025-3599

Publication date:
30/04/2025
Symantec Endpoint Protection Windows Agent, running an ERASER Engine prior to 119.1.7.8, may be susceptible to an Elevation of Privilege vulnerability, which may allow an attacker to delete resources that are normally protected from an application or user.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025

CVE-2025-4122

Publication date:
30/04/2025
A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been rated as critical. Affected by this issue is the function sub_435E04. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Severity CVSS v4.0: MEDIUM
Last modification:
12/05/2025

CVE-2025-46342

Publication date:
30/04/2025
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.13.5 and 1.14.0, it may happen that policy rules using namespace selector(s) in their match statements are mistakenly not applied during admission review request processing due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go`. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. This issue has been patched in versions 1.13.5 and 1.14.0.
Severity CVSS v4.0: Pending analysis
Last modification:
16/05/2025